/system/core/fs_mgr/ |
D | fs_mgr.c | 323 … i < fstab->num_entries && !strcmp(fstab->recs[start_idx].mount_point, fstab->recs[i].mount_point); in mount_with_alternatives() 332 … fstab->recs[i].mount_point, i, fstab->recs[i].fs_type, fstab->recs[*attempted_idx].fs_type); in mount_with_alternatives() 338 fstab->recs[i].mount_point); in mount_with_alternatives() 340 if (!__mount(fstab->recs[i].blk_device, fstab->recs[i].mount_point, &fstab->recs[i])) { in mount_with_alternatives() 345 … fstab->recs[i].blk_device, fstab->recs[i].mount_point, fstab->recs[i].fs_type, in mount_with_alternatives() 451 "%s/misc/vold/convert_fde", rec->mount_point); in needs_block_encryption() 458 "%s/convert_fbe", rec->mount_point); in needs_block_encryption() 469 if (umount(rec->mount_point) == 0) { in handle_encryptable() 473 rec->mount_point, strerror(errno)); in handle_encryptable() 478 INFO("%s is file encrypted\n", rec->mount_point); in handle_encryptable() [all …]
|
D | fs_mgr_verity.cpp | 647 basename(fstab->mount_point)) >= (int)sizeof(tag)) { in compare_last_signature() 648 ERROR("Metadata tag name too long for %s\n", fstab->mount_point); in compare_last_signature() 695 basename(fstab->mount_point)) >= (int)sizeof(tag)) { in get_verity_state_offset() 696 ERROR("Metadata tag name too long for %s\n", fstab->mount_point); in get_verity_state_offset() 796 char *mount_point; in fs_mgr_update_verity_state() local 836 mount_point = basename(fstab->recs[i].mount_point); in fs_mgr_update_verity_state() 837 verity_ioctl_init(io, mount_point, 0); in fs_mgr_update_verity_state() 840 ERROR("Failed to query DM_TABLE_STATUS for %s (%s)\n", mount_point, in fs_mgr_update_verity_state() 847 callback(&fstab->recs[i], mount_point, mode, *status); in fs_mgr_update_verity_state() 876 char *mount_point = basename(fstab->mount_point); in fs_mgr_setup_verity() local [all …]
|
D | fs_mgr_fstab.c | 304 fstab->recs[cnt].mount_point = strdup(p); in fs_mgr_read_fstab() 370 free(fstab->recs[i].mount_point); in fs_mgr_free_fstab() 389 const char *mount_point, const char *fs_type, in fs_mgr_add_entry() argument 404 new_fstab_recs[n].mount_point = strdup(mount_point); in fs_mgr_add_entry() 438 int len = strlen(fstab->recs[i].mount_point); in fs_mgr_get_entry_for_mount_point_after() 439 if (strncmp(path, fstab->recs[i].mount_point, len) == 0 && in fs_mgr_get_entry_for_mount_point_after()
|
D | fs_mgr_format.c | 113 rc = format_ext4(fstab->blk_device, fstab->mount_point); in fs_mgr_do_format()
|
D | fs_mgr_slotselect.c | 48 if (strcmp(fstab->recs[n].mount_point, "/misc") == 0) { in get_active_slot_suffix_from_misc()
|
/system/core/adb/ |
D | set_verity_enable_state_service.cpp | 47 const char* mount_point, bool enable) in set_verity_enabled_state() argument 71 WriteFdFmt(fd, "Verity already disabled on %s\n", mount_point); in set_verity_enabled_state() 76 WriteFdFmt(fd, "Verity already enabled on %s\n", mount_point); in set_verity_enabled_state() 87 WriteFdFmt(fd, "Verity %s on %s\n", enable ? "enabled" : "disabled", mount_point); in set_verity_enabled_state() 126 fstab->recs[i].mount_point, in set_verity_enabled_state_service()
|
/system/core/fs_mgr/include/ |
D | fs_mgr.h | 56 char *mount_point; member 72 const char *mount_point, int mode, int status); 97 const char *mount_point, const char *fs_type,
|
/system/vold/ |
D | TrimTask.cpp | 92 if (prev_rec && !strcmp(prev_rec->mount_point, fstab->recs[i].mount_point)) { in addFromFstab() 96 mPaths.push_back(fstab->recs[i].mount_point); in addFromFstab()
|
D | cryptfs.c | 1769 static int do_crypto_complete(char *mount_point) argument 1826 char *passwd, char *mount_point, char *label) argument 1892 sprintf(tmp_mount_point, "%s/tmp_mnt", mount_point); 1921 saved_mount_point = strdup(mount_point);
|
/system/extras/tests/fstest/ |
D | recovery_test.cpp | 202 if (!strcmp(fstab->recs[i].mount_point, "/cache")) { in setCacheInfoFromFstab()
|
/system/core/init/ |
D | builtins.cpp | 749 static void verity_update_property(fstab_rec *fstab, const char *mount_point, in verity_update_property() argument 751 property_set(android::base::StringPrintf("partition.%s.verified", mount_point).c_str(), in verity_update_property()
|
D | readme.txt | 361 verity_update_state <mount_point> 363 set the partition.<mount_point>.verified properties used by adb remount
|